Blog > Page 12

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
EvilProxy Malware Steals Session Tokens bypassing MFA on Victim’s Email Account

EvilProxy Malware Steals Session Tokens bypassing MFA on Victim’s Email Account

EvilProxy malware bypasses MFA to take over victims email account. Aug. 29th...

Read more
White House Recognizes the Importance of Cybersecurity Education with Proposed Funding

White House Recognizes the Importance of Cybersecurity Education with Proposed Funding

K-12 Cybersecurity Education in US ClassroomsThe Biden-Harris administration has taken a crucial...

Read more
Risk Assessment: A Game Changer for Your Business

Risk Assessment: A Game Changer for Your Business

Let's start with some good news: conducting a risk assessment is not like trying to solve a Rubik's cube...

Read more
CyberHoot Press Release: Graph API Support

CyberHoot Press Release: Graph API Support

CyberHoot Press Release Microsoft Graph API Integration Portsmouth, NH – July 17th, 2023 – CyberHoot, a...

Read more
The Top 10 Benefits of Integrating Cybersecurity Awareness Training and Testing into Your MSP Offering

The Top 10 Benefits of Integrating Cybersecurity Awareness Training and Testing into Your MSP Offering

Introduction: As a Managed Service Provider (MSP), your main aim is to enhance your clients' operational...

Read more
Is Microsoft Teams a Direct Trojan Horse Malware Delivery Service to Employees?

Is Microsoft Teams a Direct Trojan Horse Malware Delivery Service to Employees?

Trojan Horse Malware Delivery via Micrsoft Teams June 29th, 2023 - Microsoft...

Read more
CyberHoot Newsletter – May/June 2023

CyberHoot Newsletter – May/June 2023

Protecting Your Business and Family from DeepFake Attacks: A...

Read more
Business Ninja Interview of CyberHoot Co-Founder

Business Ninja Interview of CyberHoot Co-Founder

CyberHoot Interview by Andrew Lippman of Business Ninja's In this episode, our resident Business Ninja Andrew...

Read more
Protecting Your Business and Family from DeepFake Attacks: A Comprehensive Guide

Protecting Your Business and Family from DeepFake Attacks: A Comprehensive Guide

Introduction:As an SMB or MSP business owner, you need to know how to protect your businesses...

Read more
Hook, Line, and Secure: Reeling in the Benefits of Awareness Training and Phish Testing Services

Hook, Line, and Secure: Reeling in the Benefits of Awareness Training and Phish Testing Services

Introduction: Ahoy, Managed Service Providers (MSPs) and Small-to-Medium-Sized Businesses (SMBs)! Welcome aboard...

Read more
Old Attacks Made New Again by Hackers Exploiting our Browsers and Our Fears

Old Attacks Made New Again by Hackers Exploiting our Browsers and Our Fears

Attack Introduction:This article sheds light on a very old attack method hackers have used that...

Read more
A Cybersecurity Comedy: Protecting Businesses One Laugh at a Time!

A Cybersecurity Comedy: Protecting Businesses One Laugh at a Time!

Introduction: Cybersecurity too often seems like a stress inducing serial murder show. This makes cybersecurity...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President